A Cloud Based Optimization Method for Zero-Day Threats Detection Using Genetic Algorithm and Ensemble Learning

被引:11
|
作者
Nkongolo, Mike [1 ]
Van Deventer, Jacobus Philippus [1 ]
Kasongo, Sydney Mambwe [2 ]
Zahra, Syeda Rabab [3 ]
Kipongo, Joseph [4 ]
机构
[1] Univ Pretoria, Fac Engn Built Environm & Informat Technol, Dept Informat, ZA-0028 Pretoria, South Africa
[2] Stellenbosch Univ, Sch Data Sci & Computat Thinking, Dept Ind Engn, ZA-7600 Stellenbosch, South Africa
[3] Natl Coll Ireland, Sch Comp, Dublin D01 K6W2, Ireland
[4] Univ Johannesburg, Fac Engn & Built Environm, Dept Elect & Elect Engn Sci, 5 Kingsway Ave, ZA-2092 Johannesburg, South Africa
关键词
UGRansome1819; zero-day attacks; cloud computing; machine learning; INTRUSION DETECTION SYSTEM; ANOMALY DETECTION;
D O I
10.3390/electronics11111749
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article presents a cloud-based method to classify 0-day attacks from a novel dataset called UGRansome1819. The primary objective of the research is to classify potential unknown threats using Machine Learning (ML) algorithms and cloud services. Our study contribution uses a novel anomaly detection dataset that carries 0-day attacks to train and test ML algorithms using Amazon Web Services such as S3 bucket and SageMaker. The proposed method used Ensemble Learning with a Genetic Algorithm (GA) optimizer having three ML algorithms such as Naive Bayes (NB), Random Forest (RF), and Support Vector Machine (SVM). These algorithms analyze the dataset by combining each classifier and assessing the classification accuracy of 0-day threats. We have implemented several metrics such as Accuracy, F1-Score, Confusion Matrix, Recall, and Precision to evaluate the performance of the selected algorithms. We have then compared the UGRansome1819 performance complexity with existing datasets using the same optimization settings. The RF implementation (before and after optimization) remains constant on the UGRansome1819 that outperformed the CAIDA and UNSWNB-15 datasets. The optimization technique only improved in Accuracy on the UNSWNB-15 and CAIDA datasets but sufficient performance was achieved in terms of F1-Score with UGRansome1819 using a multi-class classification scheme. The experimental results demonstrate a UGRansome1819 classification ratio of 1% before and after optimization. When compared to the UNSWNB-15 and CAIDA datasets, UGRansome1819 attains the highest accuracy value of 99.6% (prior optimization). The Genetic Algorithm was used as a feature selector and dropped five attributes of the UGRansome1819 causing a decrease in the computational time and over-fitting. The straightforward way to improve the model performance to increase its accuracy after optimization is to add more data samples to the training data. Doing so will add more details to the data and fine-tune the model will result in a more accurate and optimized performance. The experiments demonstrate the instability of single classifiers such as SVM and NB and suggest the proposed optimized validation technique which can aggregate weak classifiers (e.g., SVM and NB) into an ensemble of the genetic optimizer to enhance the classification performance. The UGRansome1819 model's specificity and sensitivity were estimated to be 100% with three predictors of threatening classes (Signature, Synthetic Signature, and Anomaly). Lastly, the test classification accuracy of the SVM model improved by 6% after optimization.
引用
收藏
页数:26
相关论文
共 50 条
  • [41] Zero-day Malware Detection using Threshold-free Autoencoding Architecture
    Kim, Chiho
    Chang, Sang-Yoon
    Kim, Jonghyun
    Lee, Dongeun
    Kim, Jinoh
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 1279 - 1284
  • [42] A Brief Review of Unsupervised Learning Algorithms for Zero-Day Attacks in Intrusion Detection Systems
    Oluwadare, Sunkanmi
    ElSayed, Zag
    Adekoya, Oluwaseun
    2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
  • [43] XAIEnsembleTL-IoV: A new eXplainable Artificial Intelligence ensemble transfer learning for zero-day botnet attack detection in the Internet of Vehicles
    Saheed, Yakub Kayode
    Chukwuere, Joshua Ebere
    RESULTS IN ENGINEERING, 2024, 24
  • [44] Image-Based Zero-Day Malware Detection in IoMT Devices: A Hybrid AI-Enabled Method
    He, Zhangying
    Sayadi, Hossein
    2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 82 - 89
  • [45] Deep Anomaly Detection Framework Utilizing Federated Learning for Electricity Theft Zero-Day Cyberattacks
    Alshehri, Ali
    Badr, Mahmoud M.
    Baza, Mohamed
    Alshahrani, Hani
    SENSORS, 2024, 24 (10)
  • [46] Federated Learning-Enabled Zero-Day DDoS Attack Detection Scheme in Healthcare 4.0
    Salim, Mikail Mohammed
    Sangthong, Yoixay
    Deng, Xianjun
    Park, Jong Hyuk
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2024, 14
  • [47] Federated Deep Learning for Zero-Day Botnet Attack Detection in IoT-Edge Devices
    Popoola, Segun, I
    Ande, Ruth
    Adebisi, Bamidele
    Gui, Guan
    Hammoudeh, Mohammad
    Jogunola, Olamide
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) : 3930 - 3944
  • [48] When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection
    He, Zhangying
    Miari, Tahereh
    Makrani, Hosein Mohammadi
    Aliasgari, Mehrdad
    Homayoun, Houman
    Sayadi, Hossein
    PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 85 - 90
  • [49] ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques
    Alhaidari, Fahd
    Shaib, Nouran Abu
    Alsafi, Maram
    Alharbi, Haneen
    Alawami, Majd
    Aljindan, Reem
    Rahman, Atta-ur
    Zagrouba, Rachid
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [50] SECL: A Zero-Day Attack Detector and Classifier based on Contrastive Learning and Strong Regularization
    Duraz, Robin
    Espes, David
    Francq, Julien
    Vaton, Sandrine
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,